Digital watermarking system project report
https://doi.org/10.5281/ZENODO.15783157…
49 pages
1 file
Sign up for access to the world's latest research
Abstract
Data security is the essential in the today’s world of internet and networking. In any organization information is critical. In today’s world people are ready to spent thousands and lacks of money in order to ensure high level of information security. In spite of spending such a huge amount, still the objective of securing the information is not achieved as the data some how gets in the hands of hacker. As the technology for securing the data is advancing, hackers are also keeping pace with this technology. Hackers now make use of certain algorithm or other techniques to decode the data encoded by the senders. One of the ways to ensure security is to ensure that data is not visible to the hacker. This can be done by hiding the message itself behind some other objects. Here we are achieving this data security concept through the technique of Steganography.
Related papers
2017
In this digital era, it is simple to produce and create multiple copies of the data which can either be text, audio, image, softwares etc. This creates a problem concerning the protection of the intellectual and production rights. The problem may be solved by information hiding techniques that hides the important data. This paper presents an overview of basics information hiding techniques. The paper concludes with the application areas of information hiding techniques.
This paper introduces an algorithm of digitalwatermarking based on Discrete Wavelet Transform (DWT) and Steganography Based on Least Significant Bit(LSB). Steganography is a branch of information hiding. According to the characters of human vision, the information of digital watermarking which has been discrete wavelet transformed, is put into the high frequency band of the image which has been wavelet transformed. Then distills the digital watermarking with the help of the original image and the watermarking image. The steganography is the process of concealing one medium of information within another. There are lots of techniques available to achieve steganography like least significant bit insertion method and transform domain technique. This project implements the new method selecting a cover image and applying the watermarking for the copyright protection and embedding the secrete file into the watermarked image providing password with encryption method and sending to other system through the network.
In this technologically competitive world it is very important to protect the data against piracy. Past few years there is an enormous growth in accessing of internet data without knowing the originality of the information, authorization, authentication and accessing rights. The data uploaded in internet will be safe is a big question mark. To ensure that data is authenticated and secured and have legal access there are many techniques used. The most powerful technique which is used to protect the information from unauthorized users is Digital Watermarking. Digital watermarking is very efficient in Data security and robustness. Digital water marking is the promising solution for safeguard the information.
Advances in information security, 2001
Welcome to the first volume of ADVANCES IN INFORMATION SECURITY. The goals of this series are to establish the state of the art, set the course for future research in information security, and to serve as a central source of reference for information security research and developments. The scope of this series includes not only all aspects of computer and network security, but related areas such as fault tolerance and software assurance. The series aims to publish thorough and cohesive overviews on specific topics in Information Security, as well as works that are larger in scope than survey articles and that will contain more detailed background information. The series also provides a single point of coverage of advanced and timely topics and a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook. SUSHlL JAJODIA Consulting Editor To my parents Bill and Carolyn, wife Ann-Marie, and son William.-NFJ To my wife Sladjana, and my children Petar and Sonja.-ZD To my parents.-SJ Contents LIST OF FIGUR.ES .
IRJET, 2022
Watermarking technology has attracted more and more attention in various research fields Like information security. At this time, we protect the remote sensing data by using watermarking technology. As remote sensing data is delicate, it is necessary to enforce some management for authenticity and ownership. Particularly for the copyright protection, illegal use, and legitimacy identification of remote sensing image data. Therefore, this project proposes to use image watermarking technology to achieve comprehensive security protection of remote sensing image data, although the use of cryptography technology rises the applicability and security of watermarking technology. The remote sensing data is a representation of parts of the earth's surface as seen from space. The watermarking process is used for hiding digital information. A watermarking is a logo, text, or pattern. That is purposely covered in another image. Its purpose is to make it tougher for the original image to be imitative or used without authorization. Cryptography is the process of protecting information by transforming it into a secure format. Which provides an alternative solution for ensuring tamper resistance, and the ownership of intellectual property. And the tamper recognition will aware you when your device is being restricted by employees or other individual seeks. The untried results show that the arrangement of remote sensing image digital watermarking technology has good performance in the faintness and robustness of watermarking.
2014
Due to the rapid evolution in internet technology and high speed networks the use of digital data has been increased. Digital data such as audio, video and images are easily created, copied, processed, stored and distributed among the users. To ensure security and protection of digital data new technology has been developed called as a digital watermarking. Digital watermarking is a technology which embeds additional information in the host image to ensure security and protection of the digital data without effecting original data. The purpose of digital watermarking is not to restrict use of digital data but it can be provide copyright protection and authentication against unauthorized uses. In this paper detail study of watermarking definition, concept and the main contribution of watermarking process in which watermarking should be used, features, techniques, Application, challenges and performance metrics of watermarking and comparative analysis of watermarking techniques are in...
International Journal of Computer Applications, 2012
As information transmission technology progresses, the technology to protect data from unauthorized users also needs to be enhanced. Data can be plagiarized, modified, deleted etc without proper authentication and authorization. Various security mechanisms have evolved that enhances the security of digital media. Each technology to be applied successfully should ensure a balance between the three pillars of security; confidentiality, integrity and availability. Digital watermarking is one such technique. It is a mechanism to monitor the digital media with the help of information residing within the content itself. To put it simply, digital watermarking is embedding of information into source content that can be detected and extracted. Digital watermarking can be applied to media like text, audio, image, video etc. This paper provides a comprehensive idea behind this technology and its usage.
2019
In the recent days, the internet plays a vital role in the data transfer. During such data transmission, there are numerous possibilities of data getting stolen or breached. To avoid such breaches taking place in the data transmission, the watermarking technique plays a major role in the prevention of data stolen. Digital Watermarking is wide and evolving area in the information technology. In this area, various methods are used for sensitive data are being hidden in digital formats such as images, text, audio or video. The secret information is embedded in such methods where the information, which is hidden secretly, is embedded to the host image, which can be extracted with proper authentication mechanism. The extracted data can be used for various purposes like authentication, copyright protection, owner identification and content protection etc. This paper includes the detailed study regarding the types of digital watermarking and its various techniques employed to secure the co...
— The expansion of the Internet has frequently increased the availability of digital data such as audio, images and videos to the public. Digital watermarking is a technology being developed to ensure and facilitate data authentication, security and copyright protection of digital media. This paper incorporate the detail study watermarking definition, concept and the main contributions in this field such as categories of watermarking process that tell which watermarking method should be used.
Now a days most of the people prefer to use internet to send data from one place to another across the world. The fast growth of Internet resulted into a major demand in transferring the information safe and accurate. However the information can be hacked while sending data over the internet. In order to transfer the data to the user at destination without any modifications, there are many techniques available like Cryptography, Watermarking and steganography. In this paper digital Watermarking and steganography technique using Least Significant Bit (LSB) algorithm is proposed to embed the message/logo into the audio file. The objective of this review is to provide a new algorithm for steganography and watermarking .This algorithm has many advantages such as it provide a better background for the use of audio file or image.

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.